Journal Vol – 14 No -1, February 2019

Exact wave solutions to the (2+1)-dimensional Klein-Gordon equation with special types of nonlinearity

Authors:

Sk. Tanzer Ahmed Siddique, Md. Dulal Hossain, M. Ali Akbar

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00001

Abstract:

In this article, we investigate the traveling wave solutions to the Klein-Gordon equation in (2+1)-dimension with special types of nonlinearity. The types include quadratic, cubic and polynomial nonlinearity. The Klein-Gordon equation assumes significant role in numerous types of scientific investigation such as in quantum field theory, nonlinear optics, nuclear physics, magnetic field etc. To investigate the aimed traveling wave solutions, we execute the (𝐺′/𝐺)-expansion method. The attained solutions are in the form of hyperbolic, trigonometric and rational functions. The results acknowledged that the applied method is very efficient and suitable for discovering differential equations with various types of nonlinearity considered in optics and quantum field theory. The solutions of the Klein-Gordon equation with quadratic, cubic, and polynomials nonlinearity play a significant role in many scientific measures notably optics and quantum field theory.

Keywords:

Klein-Gordon equation,nonlinearity,travelingwave solutions,

Refference:

I.Abdou, M., The extended tanh method and its applications for solving nonlinear physical models.Applied Mathematics and Computation, 2007. 190(1): p. 988-996.

II.Ablowitz, M.J., et al., Solitons, nonlinear evolution equations and inverse scattering. Vol. 149. 1991: Cambridge university press.

III.Adomian, G., Solving Frontier Problems of Physics: The Decomposition Method Kluwer.Boston, MA, 1994.

IV.Akbar, M.A., N. Hj, and M. Ali. New solitary and periodic solutions of nonlinear evolution equation by Exp-function method. in World Appl. Sci. J. 2012. Citeseer.

V.Akter, J. and M.A. Akbar, Exactsolutions to the Benney-Luke equation and the Phi-4 equations by using modified simple equation method.Results in physics, 2015. 5: p. 125-130.

VI.Alfimov, G., et al., Wannier functions analysis of the nonlinear Schrödinger equation with a periodic potential.Physical Review E, 2002. 66(4): p. 046608.

VII.Biswas, A., C. Zony, and E. Zerrad, Soliton perturbation theory for the quadratic nonlinear Klein-Gordon equation.Applied Mathematics and Computation, 2008. 203(1): p. 153-156.

VIII.Biswas, A., et al., Solitons and conservation laws of Klein–Gordon equation with power law and log law nonlinearities.Nonlinear Dynamics, 2013. 73(4): p. 2191-2196.

IX.Cataliotti, F., et al., Superfluid current disruption in a chain of weakly coupled Bose-Einstein condensates.New Journal of Physics, 2003. 5(1): p. 71.

X.El-Wakil, S., M. Abdou, and A. Hendi, New periodic wave solutions via Exp-function method.Physics Letters A, 2008. 372(6): p. 830-840.

XI.Guy, J., Lagrange characteristic method forsolving a class of nonlinear partial differential equations of fractional order.Applied Mathematics Letters, 2006. 19(9): p. 873-880.

XII.Khan, K. and M.A. Akbar, Exact and solitary wave solutions for the Tzitzeica-Dodd-Bullough and the modified KdV-Zakharov-Kuznetsov equations using the modified simple equation method.Ain Shams Engineering Journal, 2013. 4(4): p. 903-909.

XIII.Kumar, A., S. Kumar, and M. Singh, Residual power series method for fractional Sharma-Tasso-Olever equation.Communications in Numerical Analysis, 2016. 2016(1): p. 1-10.

XIV.Mohyud-Din, S.T., A. Yildirim, and S.A. Sezer, Numerical soliton solutions of improved Boussinesq equation.International Journal of Numerical Methods for Heat & Fluid Flow, 2011. 21(7): p. 822-827.

XV.Naher, H., F.A. Abdullah, and M.A. Akbar, New traveling wave solutions of the higher dimensional nonlinear partial differential equation by the Exp-function method.Journal of Applied Mathematics, 2012. 2012.

XVI.Sassaman, R. and A. Biswas,Topological and non-topological solitons of the Klein-Gordon equations in 1+ 2 dimensions.Nonlinear Dynamics, 2010. 61(1-2): p. 23-28.

XVII.Shakeri, F. and M. Dehghan, Numerical solution of the Klein–Gordon equation via He’s variational iteration method.Nonlinear Dynamics, 2008. 51(1-2): p. 89-97.

XVIII.Sirendaoreji, Exact travelling wave solutions for four forms of nonlinear Klein-Gordon equations.PHYSICS LETTERS A, 2007. 363(5-6): p. 440-447.

XIX.Wazwaz, A.-M., New travelling wave solutionsto the Boussinesq and the Klein–Gordon equations.Communications in Nonlinear Science and Numerical Simulation, 2008. 13(5): p. 889-901.

XX.Wazwaz, A.-M., The combined Laplace transform-Adomian decomposition method for handling nonlinear Volterra integrodifferential equations.Applied Mathematics and Computation, 2010. 216(4): p. 1304-1309.

XXI.Yan, C., A simple transformation for nonlinear waves.Physics Letters A, 1996. 224(1-2): p. 77-84.

XXII.Yasuk, F., A. Durmus, and I. Boztosun, Exact analytical solution to the relativistic Klein-Gordon equation with noncentral equal scalar and vector potentials.Journal of mathematical physics, 2006. 47(8): p. 082302.

XXIII.Zheng, Y. and S. Lai, A study on three types of nonlinear Klein-Gordon equations.Dynamics of Continuous, Discrete and Impulsive Systems: Series B, 2009. 16(2): p. 271-279.

View Download

Correlation between Compressive Strength and Split Tensile Strength of GGBS and MK Based Geopolymer Concrete using Regression Analysis

Authors:

B. Sarath Chandra Kumar, Sadasivan Karuppusamy, K. Ramesh

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00002

Abstract:

In this study, the compressive strength and split tensile strength were performed on totally 264 laboratory made Geopolymer Concrete cubes and 264 laboratory made Geopolymer Concrete cylinders. Regression analysis using R software was carried out. A simple relationship was determined and correlated between compressive strength and split tensile strength. The concrete cubes were prepared with various mix proportions that yield cube crushing strength within the range of 20 to 60 Mpa.

Keywords:

Compressive Strength,Split Tensile Strength,GGBS,Metakaoline,Regression Analysis,

Refference:

I.A. Sofi, B. R. Phanikumar, “An experimental investigation on flexural behaviour of fibre-reinforced pond ash-modified concrete”, Ain Shams Engineering Journal. vol. 6, pp: 1133-1142, 2015.

II.B. Sarath Chandra Kumar, K Ramesh, “Analytical Study on Flexural Behaviour of Reinforced Geopolymer Concrete Beams by ANSYS”, IOP Conference Series: Materials Science and Engineering, 455, 012065, pp: 01-09, 2018.

III.B. SarathChandra Kumar, K. Ramesh and P. Poluraju, “An experimental investigation on flexural behavior of GGBS and metakaolin based geopolymer concrete”, ARPN journal of engineering and applied sciences, vol. 12, no. 7, pp: 2052-2062, 2017.

IV.Bakharev T., “Durability of geopolymer materials in sodium and magnesium sulfate solutions”, Cement and Concrete Research. vol. 35, no. 6, pp: 1233-1246, 2005.

V.Bakharev T., “Geopolymeric materials prepared using Class Fly ash and elevated temperature curing”, Cement and Concrete Research. vol. 35, pp: 1224-1232, 2005.

VI.Bakharev T., “Resistance of geopolymer materials to acid attack”, Cement and Concrete Research. vol. 35, no. 4, pp: 658-670, 2005.

VII.Chun LB, Sung KJ, Sang KT, Chae ST, “A study on the fundamental properties of concreteincorporating pond-ash in Korea”, 3rd International conference on the sustainable concrete technology and structures sustainable concrete technology and structures in local climate and environmental conditions, Vietnam. pp: 401-408, 2008.

VIII.Darren Williams, “Concrete Strength Prediction from Early-Age Data”-Technical Paper, Honor Project, Technical Paper, University of Adelaide.

IX.Dattatreya J. K., Rajamane N. P., Sabitha D., Ambily P. S., Nataraja M. C., “Flexural behaviour of reinforced Geopolymer concrete beams”, International Journal of Civil and Structural Engineering. vol. 2, no. 1, pp: 138-159, 2011.

X.Davidovits J., “Geopolymers: inorganic polymeric new materials”, Journal of Thermal Analysis. vol. 37: pp: 1633-1656, 1991.

XI.Duxson P., Fernández Jiménez A, Provis J L, Lukey G C, Palomo A, Van Deventer, “Geopolymer Technology-The current state of the art”, Journal of Material Science. vol. 42, no.9, pp: 2917-2933, 2007.

XII.Gabriel Varga., “The Structure of Kaolinite and Metakaolin”, Epitoanyag, vol. 59, pp: 6-9,2007

XIII.Hardjito D. and Rangan B.V., “Development and properties of low calcium fly ash based geopolymer concrete”, Research report GC1, Curtin University of Technology, Perth, Australia, 2005.

XIV.K. Vijai, R. Kumutha and B. G. Vishnuram, “Experimental Investigations on Mechanical Properties of Geopolymer Concrete Composites”, Asian Journal of Civil Engineering (Building and Housing), vol. 13, no.1, pp: 89-96, 2012.

XV.M. F. M. Zain, Suhad M. Abd, K. Sopian, M. Jamil, Che-Ani A.I., “Mathematical Regression Model for the Prediction of Concrete Strength. Mathematical methods”, computational techniques, non-linear systems, intelligent systems. pp: 396-402.

XVI.P. Ramadoss, “Modelling for the evaluation of strength and toughness of high performance fiber reinforced concrete”, Journal of Engineering Science and Technology. vol. 7, no.3, pp: 280-291, 2012.

XVII.Palomo A., Grutzeck M.W., Blanco M.T., “Alkali activated Fly Ashes: Cement for the Future”, Cement and Concrete Research. vol. 29: pp: 1323-1329, 1999.

XVIII.Sofi D., Van Deventer J.S.J., Mendis P.A., Lukey G.C., “Engineering properties of inorganic polymer concretes (IPCs)”, Cement and Concrete Research. vol. 37, pp: 251-257, 2006.

XIX.Suresh G. Patil and Manojkumar, “Factors Influencing Compressive Strength of Geopolymer Concrete”, International Journal of Research in Engineering and Technology, pp: 372-385, 2013.

XX.Van Jaarsveld J. G. S., Van Deventer J.S. J., Lukey G.C., “The effect of composition and temperature on the properties of fly ash and kaolinite based geopolymers”, Chemical Engineering Journal. vol. 89, no.13, pp: 63-73, 2002.

XXI.Wallah S.E., Rangan B.V., “Low calcium fly ash based geopolymer concrete: long term properties”, Research report GC2, Curtin University of Technology, Perth, Australia, 2006.

View Download

iBTTA: IMPROVED BODY TISSUES TEMPERATURE AWARE ROUTING SCHEME FOR WBANs

Authors:

Muhammad Aadil, Sheeraz Ahmed, Muhammad Zubair, M.Saeed Hussain kakar, Muhammad Junaid, Ata-ur-Rehman

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00003

Abstract:

Wireless Body Area Sensor Network (WBANs) are used to measure the biological parameters of a human body in a critical health situation. Sensors use an antenna and electromagnetic radiations to drive the response towards the sink node. Our research focuses on the overheating problem of body tissues due to the electromagnetic field generated by electromagnetic radiations. When sensor nodes continuously send and receive the data, it not only influences the communication between the nodes by stimulating high attenuation for signal transmission, but also conduits various health problems. These health issues may include reducing blood flow, affecting the enzymatic reactions, brain tumor, damaging the sensitive tissues and leading to tissue cancer. The exposition of such issues are addressed in our research called iBTTA (Improved Body Tissue Temperature Aware)routing scheme, where not only the temperature of a body tissues is controlled under the threshold value but significantly improves the performance in terms of its throughput, end- to- end delay and transmission loss. The scheme is an extension of our previously published scheme BTTA. The validation of our scheme iBTTA is done through comparison with already existing techniques SIMPLE (Stable Increased-throughput Multi-hop Protocol for Link Efficiency in WBANs) and LAEEBA (Link-Aware and Energy Efficient scheme for WBANs). In iBTTA we have improved the problem of the body tissues temperature, utilization of battery power and load balancing techniques in WBANs.

Keywords:

Tissues temperature,Attenuation,WSNs,Load balancing,Network Lifetime,residual energy,

Refference:

I.Abdellah, Ezzati, S. A. I. D. Benalla, AbderrahimBeniHssane, and MoulayLahcenHasnaoui. “Advanced low energy adaptive clustering hierarchy.”Proceedings of the International Journal on Computer Science and Engineering (IJCSE)2, no. 7 (2010): 2491-2497.6.

II.Adhikary, Sriyanjana, SankhayanChoudhury, and SamiranChattopadhyay. “A new routing protocol for WBAN to enhance energy consumption and network lifetime.” InProceedings of the 17th International Conference on Distributed Computing and Networking, p. 40. ACM, 2016.16.

III.Afridi, A., NadeemJavaid, S. Jamil, M. Akbar, Zahoor Ali Khan, and Umar Qasim. “HEAT: Horizontal Moveable Energy-efficient Adaptive Threshold-Based Routing Protocol for Wireless Body Area Networks.” InAdvanced Information Networking and Applications Workshops (WAINA),2014 28th International Conference on, pp. 474-478. IEEE, 2014.17.

IV.Ahmed, S., Nadeem Javaid, SidrahYousaf, Ashfaq Ahmad, Muhammad Moid Sandhu, Muhammad Imran, Zahoor Ali Khan, and N. Alrajeh. “Co-LAEEBA: Cooperative link aware and energy efficient protocol for wireless body area networks.”Computers in Human Behavior51 (2015): 1205-1215.3

V.Ahmed, S., NadeemJavaid, M. Akbar, AdeelIqbal, Z. A. Khan, and U. Qasim. “LAEEBA: Link aware and energy efficient scheme for body area networks.” InAdvanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference on, pp. 435-440. IEEE, 2014.12.

VI.Anand, Jyoti, and Deepak Sethi. “Comparative analysis of energy efficient routing in WBAN.” InComputational Intelligence & Communication Technology (CICT), 2017 3rd International Conference on, pp. 1-6. IEEE, 2017.10.

VII.Asif, Amna, and Irshad Ahmed Sumra. “Applications of Wireless Body Area Network (WBAN): A Survey.” (2017).1.

VIII.Awan, Khalid, KashifNaseerQureshi, and MehwishMehwish. “Wireless Body Area Networks Routing Protocols: A Review.”Indonesian Journal of Electrical Engineering and Computer Science4, no. 3 (2016): 594-604.Gfggg.5.

IX.Effatparvar, Mehdi, Mehdi Dehghan, and Amir MasoudRahmani. “A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.”Journal of medical systems40, no. 9 (2016): 201.7.

X.Khan, Rahat Ali, Khalid Hussain Mohammadani, Azhar Ali Soomro, Jawad Hussain, Sadia Khan, Tahir Hussain Arain, and Hima Zafar. “An energy efficient routing protocol for wireless body area sensor networks.”Wireless Personal Communications99, no. 4 (2018): 1443-1454.20.

XI.Manirabona, Audace, SaadiBoudjit, and Lamia ChaariFourati. “Energy aware routing protocol for inter WBANs cooperative Communication.” InNetworks, Computers and Communications (ISNCC), 2015 International Symposium on, pp. 1-6. IEEE, 2015.4.

XII.Naik, M. Raj Kumar, and P. Samundiswary. “Wireless body area network security issues—Survey.” InControl, Instrumentation, Communication and Computational Technologies (ICCICCT), 2016 International Conference on, pp. 190-194. IEEE, 2016.8.

XIII.Qureshi, KashifNaseer, Faisal Bashir, and Abdul Hanan Abdullah. “An energy and link aware next node selection protocol for body area networks.” InInformation Networking (ICOIN), 2018 International Conference on, pp. 721-726. IEEE, 2018.9.

XIV.Sahndhu, Muhammad Moid, NadeemJavaid, Muhammad Imran, Mohsen Guizani, Zahoor Ali Khan, and Umar Qasim. “BEC: A novel routing protocol for balanced energy consumption in Wireless Body Area Networks.” InWireless Communications and Mobile Computing Conference (IWCMC), 2015 International, pp. 653-658. IEEE, 2015.15.

XV.Smail, Omar, AddaKerrar, Youssef Zetili, and Bernard Cousin. “ESR: Energy aware and Stable Routing protocol for WBAN networks.”InWireless Communications and Mobile Computing Conference (IWCMC), 2016 International, pp. 452-457. IEEE, 2016.11.

XVI.Talha, Sadaf, Rizwan Ahmad, and Adnan Khalid Kiani. “Priority based energy aware (pea) routing protocol for wbans.” InVehicular Technology Conference (VTC Fall), 2015 IEEE 82nd, pp. 1-5. IEEE, 2015.2.

XVII.Thotahewa, Kasun MS, Jean-Michel Redoutè, and Mehmet RasitYuce. “Propagation, power absorption, and temperature analysis of UWB wireless capsule endoscopy devices operating in the human body.”IEEE Transactions on Microwave Theory and Techniques63, no. 11 (2015): 3823-3833.13.

XVIII.ul Islam, Saif, Ghufran Ahmed, MahamShahid, Najmul Hassan, Muhammad Riaz, Hilal Jan, and AzfarShakeel. “Implanted Wireless Body Area Networks: Energy Management, Specific Absorption Rate and Safety Aspects.” InAmbient Assisted Living and Enhanced Living Environments, pp. 17-36. 2017.18.

XIX.Wu, Tin-Yu, and Cheng-Han Lin. “Low-SAR path discovery by particle swarm optimization algorithm in wireless body area networks.”IEEE Sensors Journal15, no. 2 (2015): 928-936.19.

XX.Yousaf, S., S. Ahmed, M. Akbar, Nadeem Javaid, Zahoor Ali Khan, and Umar Qasim. “Co-CEStat: Cooperative Critical Data Transmission in Emergency in Static Wireless Body Area Network.” InBroadband and Wireless Computing, Communication and Applications (BWCCA), 2014 Ninth International Conference on, pp. 127-132. IEEE, 2014.14

View Download

An Efficient Camera Identification Technique using Krawtchouk Moment Invariants

Authors:

Megha Borole, Prof. S. R. Kolhe

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00004

Abstract:

In late years, camera identification methods have drawn attention in the area of digital forensics. To detect the source camera through which the picture is caught, Photo-Response Non uniformity (PRNU) noise is utilized as a camera, impression, as it is a particular component that recognizes pictures taken from the comparable cameras. This paper introduces a camera identification technique which is based on Krawtchouk Moment invariant features. The Photo Response Non-Uniformity (PRNU) noise is a type of sensor finger impression, which permits to extraordinarily distinguish the camera that took an image. It is estimated from the denoised images using a denoised filter. Then estimate the Krawtchouk Moment invariants from the PRNU noise pattern. The Krawtchouk Moments are invariant to scaling, translation, rotation, and shear. These invariants are fed to Fuzzy Min-Max Neural Network with Compensatory Neuron (FMCN) and by performing ten-fold cross-validation technique, verification is made out. The experimental results show that the proposed technique achieves an average accuracy of 93.3% for first experiment and 98.3% for the second experiment.

Keywords:

Camera identification,photo response non-uniformity (PRNU),Krawtchouk moments,fuzzy min-max neural networkwith compensatory neuron (FMCN),

Refference:

I.Alessandro Piva, “Review Article an Overview on Image Forensics”, Hindawi Publishing Corporation ISRN Signal Processing, Volume 2013, Article ID 496701, http://dx.doi.org/10.1155/2013/496701 (2013).

II.A. Tuama, F. CombyandM. Chaumont, “Camera model identification based machine learning approach with high order statistics features”, 24th European Signal Processing Conference (EUSIPCO), Budapest, 2016, pp. 1183-1187.

III.Anass El affar, Khalid Ferdous, AbdeljabbarCherkaoui, Hakim El fadiliand Hassan Qjidaal, “Krawtchouk Moment Feature Extraction for Neural Arabic Handwritten Words Recognition”, IJCSNS International Journal of Computer Science and Network Security, Vol.9 No.1. 2009.

IV.Abhijeet V. Nandedkar, Prabir K. Biswas, “A Fuzzy Min-Max Neural Network Classifier with Compensatory Neuron Architecture”, IEEE Transactions On Neural Networks, Vol. 18. No. 1, 2007.

V.F. Meng, X. Kong and X. You, A new feature-based method for source camera identification, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 207–218, 2008.

VI.F. Razzazi and A. Seyedabadi, “A robust feature for single image camera identification using local binary patterns,” 2014 IEEE International Symposium on SignalProcessing and Information Technology (ISSPIT), Noida, 2014, pp. 000462-000467.

VII.G. Xu, Y. Q. Shi, “Camera model identification using local binary patterns”, Proc. IEEE Int Conference on Multimedia and Expo (ICME), pp. 392-397, 2012.

VIII.I. Amerini, R. Caldelli, P. Crescenzi, A. Del Mastio, A. Marino, “Blind Image Clustering Based on the Normalized Cuts Criterion for Camera Identification”, Image Communication, ELSEVIER, pp. 1 -13, 2014.

IX.J. Lukas, J. FridrichandM. Goljan, “Digital camera identification from sensor pattern noise,” in IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 205-214, June 2006.

X.K.R. Akshatha, A.K. Karunakar, H. Anitha, U. Raghavendra, Dinesh Shetty, “Digital camera identification using PRNU: A feature basedapproach”, Digital Investigation, Journal, Elsevier, 19 (2016).

XI.M. C. Stamm, M. Wu and K. J. R. Liu, “Information Forensics: An Overview of the First Decade”, in IEEE Access, vol. 1, pp. 167-200, 2013.

XII.M. Kharrazi, H.T. Sencar, N. Memon, “Blind source camera identification”, IEEE International Conference on Image Processing ICIP ’04., vol. 1, pp. 709-712, 2004.

XIII.M. KivancMihcak, I. Kozintsev and K. Ramchandran, “Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising,” 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258), Phoenix, AZ, 1999, pp. 3253-3256 vol.6.

XIV.O. Celiktutan, B. Sankur, I. Avcibas, “Blind identification of source cell-phone model”, IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 553-566, 2008.

XV.P. T. Yap, P. Raveendran and S. H. Ong, “Krawtchouk moments as a new set of discrete orthogonal moments for image reconstruction”, In Neural Networks, 2002. IJCNN’02. Proceedings of the 2002 International Joint Conference on (Vol. 1, pp. 908-912). IEEE, 2002.

XVI.P. T. Yap, R. Paramesran and S. H. Ong, “Image analysis by Krawtchouk moments”, Image Processing, IEEE Transactions on, 12(11), 1367-1377, 2003.

XVII.S. Bayram, H.T. Sencar, N. Memon, “Improvements on source camera model identification based on cfainterpolation”, Advances in Digital Forensics II IFIP International Conference on Digital Forensics, pp. 289-299, 2006.

XVIII.S. Saito, Y. Tomioka and H. Kitazawa, “A Theoretical Framework for Estimating False Acceptance Rate of PRNU-Based Camera Identification,” in IEEE Transactions on Information Forensics and Security, vol. 12, no. 9, pp. 2026-2035, Sept. 2017.

XIX.T. Filler, J. Fridrich, M. Goljan, “Using sensor pattern noise for camera model identification”, Proc. FCIP 15th IEEE International Conference on Image Processing, pp. 1296-1299, 2008.

XX.TechnischeUniversität Dresden, Dresden, Germany. Dresden Image Database, accessed on May 1, 2015. [Online]. Available: http://forensics.inf.tu-dresden.de/ddimgdb.

XXI.X. Kang, Y. Li, Z. Qu and J. Huang, “Enhancing Source Camera Identification Performance with a Camera Reference Phase Sensor Pattern Noise”, in IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 393-402, April 2012.

XXII.Y. Sutcu, S. Bayram, H. T. Sencar and N. Memon, “Improvements on Sensor Noise Based Source Camera Identification,” 2007 IEEE International Conference on Multimedia and Expo, Beijing, 2007, pp. 24-27.

XXIII.Yoichi Tomioka, Yuya Ito, and Hitoshi Kitazawa, “Robust Digital Camera Identification Based on Pairwise Magnitude Relations of Clustered Sensor Pattern Noise”, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 12, December 2013.

View Download

Influence of Lime on Low Plastic Clay Soil Used as Subgrade

Authors:

Adnan Asad, ArshadHussain, Abdul Farhan, Adeel Ahmed Bhatti, Mehr-E-Munir

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00005

Abstract:

Weak clayey soil can cause premature failure in subgrade so their removal or proper treatment is necessary for the efficiency of structure. Soil stabilization is an excellent choice and economical in many circumstances for treatment and proper behavior of weak subgrade soil as recommended by many researchers. Lime is the oldest and well known additive for stabilization of many type of soils. This paper presents geotechnical investigation of low plastic clay soil being used as subgrade stabilized with lime. The low plastic clayey subgrade soil was stabilized with different percentages of lime and results show that soil can be satisfactorily stabilized with the addition of 6% lime. The Atterberg’s limit, compaction characteristics and strength tests including unconfined compressive strength (UCS) and California bearing ratio (CBR) tests were performed. Results indicate that addition of lime reduce plasticity index. An increase in OMC was observed with the decrease in maximum dry density (MDD). CBR and unconfined compressive strength of soil (qu)values improved significantly with the addition of lime.

Keywords:

Soil Stabilization,Lime,Subgrade Stabilization,Low Plastic Clay,

Refference:

I.Al-Rawas, A. A., Hago, A. W., & Al-Sarmi, H. (2005). Effect of lime, cement and Sarooj (artificial pozzolan) on the swelling potential of an expansive soil from Oman.Building and Environment,40(5), 681-687.

II.Eisazadeh, A., Kassim, K. A., & Nur, H. (2012). Solid-state NMR and FTIR studies of lime stabilized montmorillonitic and lateritic clays.Applied Clay Science,67, 5-10.

III.Ghobadi, M. H., Abdilor, Y., & Babazadeh, R. (2014). Stabilization of clay soils usinglime and effect of pH variations on shear strength parameters.Bulletin of Engineering Geology and the Environment,73(2), 611-619.

IV.Harichane, K., Ghrici, M., Kenai, S., & Grine, K. (2011). Use of natural pozzolana and lime for stabilization of cohesive soils.Geotechnical and geological engineering,29(5), 759-769.

V.Ingles, O. G., & Metcalf, J. B. (1972).Soil stabilization principles and practice(Vol. 11, No. Textbook).

VI.Little, D. N., Thompson, M. R., Terrell, R. L., Epps, J. A., & Barenberg, E. J. (1987).Soil stabilization for roadways and airfields. LITTLE (DALLAS N) AND ASSOCIATES BRYAN TX.

VII.Murthy, V. N. S. (2002).Geotechnical engineering: principles and practices of soil mechanics and foundation engineering. CRC press.

VIII. Muhmed, A., & Wanatowski, D. (2013). Effect of Lime Stabilisation on the Strength and Microstructure of Clay IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) ISSN: 2320-334X.Volume6, Issue3.

IX.Osinubi, K. J., Bafyau, V., & Eberemu, A. O. (2009). Bagasse ash stabilization of lateritic soil. InAppropriate Technologies for Environmental Protection in the Developing World(pp. 271-280). Springer, Dordrecht.

X.Rogers, C. D. F., Glendinning, S., & Roff, T. E. J. (1997, October). Lime modification of clay soils for construction expediency. InProceedings of the Institution of Civil Engineers: Geotechnical Engineering(Vol. 125, No. 4).

XI.Tuncer, E. R., & Basma, A. A. (1991). Strength and stress-strain characteristics of a lime-treated cohesive soil.Transportation Research Record, (1295).

View Download

Analysis of Effect of Ground Granulated Blast Furnace Slag (GGBFS) on the Mechanical Properties of Concrete using Destructive and Non-destructive Tests

Authors:

Tarun Yadav, Jatin Singh, Sandeep Panchal, Md. Mohsin Khan, Shilpa Pal

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00006

Abstract:

Ground granulated furnace slag is a waste material which is rich in Calcium. Aim of this study is to observe the effect of mixing of ground granulated blast furnace slag as a replacement of cement in concrete. The study is conducted on M-30 grade concrete. The cement is replaced partially by the ground granulated blast furnace slag to obtain a cost-effective mix. The concrete mixes are prepared by replacing the cement by 15%, 30%, 45%, 60% and 75 % ground granulated blast furnace slag. The tests are performed to know the compressive strength, flexural strength and workability of concrete. Non-destructive tests like rebound hammer test and ultrasonic pulse velocity tests are also performed to understand the post hardening characteristics of the concrete. It is found that the replacement of cement GGBFS reduces the initial strength of concrete but increases the ultimate strength if mixed in optimum amount. The optimum percentage of ground granulated furnace slag in M-30 concrete is found to be 45%. The workability increases as the amount of GGBFS is increased in the mix. The post hardening tests show the better performance of concrete at 30% and 45% mixing of GGBFS in concrete.

Keywords:

GGBFS,waste management,concrete,flexural strength,compression strength ,

Refference:

I.A. Islam, U.H. Alengaram, M.Z. Jumaat, I.I. Bashar, “The Development of Compressive Strength of Ground Granulated Blast Furnace Slag-Palm Oil Fuel Ash-Fly Ash Based Geo-polymer Mortar”, Materials and Design, Vol. 56, pp. 833-841, April 2014.

II.A.Venkatakrishnaiah, G.Sakthviel, “Bulk Utilization of Fly-ash in Self-compacting Concrete”, KSCE Journal of Civil Engineering, Vol. 19, No.7, pp. 2116-2120, November 2015.

III.F. Hogan, J. Meusel, “Evaluation for Durability and Strength Development of a Ground Granulated Blast Furnace Slag,” Cement, Concrete and Aggregates, Vol. 3, No. 1, pp. 40-52, 1981.

IV.H. Sethi, P.P. Bansal, R. Sharma, “Effectof Addition of GGBS and Glass Powder on the Properties of Geo-polymer Concrete”, Iranian Journal of Science and Technology, Transactions of Civil Engineering, pp. 1-11, November 2018.

V.H. Wang, J. Wang, X. Sun, W. Jin, “Improving Performance of Recycled Aggregate Concrete with Superfine Pozzolanic Powders”, Journal of Central South University, Vol. 20, No. 12, pp. 3715-3722, December 2013

VI.L. Black, P. Purnell, J. Hill, “Current Themes in Cement Research”, Advances in Ceramics, Vol. 109, No. 5, pp. 253-259, 2010.

VII.M.R. Antonyamaladhas, S. Chachithanantham, A. Ramaswamy, “Performance and Behaviour of Ground Granulated Blast Furnace Slag Imparted to Geopolymer Concrete Structural Elements and Analyzed with ANSYS”, Advances in Material Science and Engineering, Vol. 2016, pp. 1-9, August 2016.

VIII.M.Arizoumandi, S.A.Volz, “Effect of Fly Ash Replacement Level on the Fracture Behavior of Concrete”, Frontiers of Structural and Civil Engineering, Vol. 7, No. 4, pp. 411-418,December 2003.

IX.M. Elchalakani, T. Aly, E. Abu-Aisheh, “Sustainable concrete with high volume GGBFS to build Masdar City in the UAE”, Case Studies in Construction Materials, Vol. 1, pp. 10-24, December 2013.

X.O.Kayali,“Effect of High Volume Fly Ash on Mechanical Properties of Fiber Reinforced Concrete”, Materials and Structures, Vol. 37, No. 5, pp. 318-327, June 2004.

XI.O.M. Omar, G. D. AbdElhameed, M. A Sherif, H.A. Mohamadien, “Influence of limestone waste as partial replacement material for sand and marble powder in concrete properties”, HRBC Journal,Vol. 8, No. 3, pp. 193-203, December 2003.

XII.R. Siddique, D. Kaur, “Properties of Concrete Containing Ground Granulated Blast Furnace Slag (GGBFS) at Elevated Temperatures”, Journal of Advanced Research, Vol. 3, No. 1, pp. 45-51, January 2012.

XIII.S.A. Zareei, F.Ameri, F. Dorostkar, M. Ahmadi, “Rice Husk Ash as a Partial Replacement of Cement in High Strength Concrete containing Micro Silica: Evaluating Durability and Mechanical Properties”, Case Studies in Construction Materials, Vol. 7, pp. 73-81, December 2017.

XIV.S.P. Dunuweera, R.M.G. Rajapakse, “Cement Types, Composition, Uses and Advantages of Nano-cement, Environmental Impact on Cement Production, and Possible Solutions”, Advances in Material Science and Engineering, Vol. 2018, pp. 1-13, April 2018.

XV.S.V. Deo, “Parametric Study of Glass Fiber Reinforced Concrete”, Advances in Structural Engineering, In: Matsagar V. (eds), Springer, New Delhi, pp. 1909-1916, December 2004.

View Download

A Modification of the Generalized Kudryashov Method for the System of Some Nonlinear Evolution Equations

Authors:

H. M. Shahadat Ali, M. A.Habib, M. Mamun Miah, M. Ali Akbar

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00007

Abstract:

In this study, a comparatively new technique named the generalized Kudryashov method (gKM) has been effectively implemented to explore the exact traveling wave solutions to some nonlinear evolution equations (NLEEs) in the field of nonlinear science and engineering. The effectiveness of the new functional method has been demonstrated by investigating single as well as coupled equations with arbitrary parameters explicitly the coupled Higgs field equation, the Benney-Luke equation, and the Drinfel'd-Sokolov-Wilson (DSW) equation. As a matter of fact, the solution attained in this article thrust into the abundant wave solutions which includes kink, singular kink, periodic and solitary wave solutions. Moreover, the characteristics of these analytic solutions are interpreted depicting some 2D and 3D graph by using computer symbolic programming Wolfram Mathematica. The computational work ascertained that the employed method is sturdy, simple, precise, and wider applicable. Also, the prominent competence of this current method ensures that practically capable to reducing the size of the computational task and can be solved several nonlinear types of new complex higher order partial differential equations that originating in applied mathematics, computational physics and engineering.

Keywords:

Thegeneralized Kudryashov method,Coupled Higgs field equation,Benney-Luke equation,DSW equation, Traveling wave solution,Solitary wave solution,Exact solution,

Refference:

I.A. Bekir,A. Boz, “Applications of the He’s exp function method for nonlinear evolution equations”, Comput. Math. Appl., Vol.: 58, Issue: 11-12, pp.: 2286-2293, 2009.

II.A.H. Arnous, M. Mirzazadeh, M. Eslami,”Exact solution of the Drinfel’d Sokolov Wilson equation using Backlund transformation of Riccati equation and trial function approach”,Prama. J. Phys. Vol.: 86, Issue: 6,pp.: 1153-1160, 2016.

III.A. H. Arnous, M. Mirzazadeh, M. Eslami,”The Backlund transformation method of Riccati equation applied to Coupled Higgs field and Hamiltonian amplitude equations”,Comput. Methods Diff. Equat.,Vol.: 2, Issue: 4,pp.: 216-226, 2014.

IV.A. J. M. Jawad, M. D. Petkovic, A. Biswas,”Modified simple equation method for nonlinear evolution equations”, Appl. Math. Comput., Vol.: 217, Issue: 2,pp.: 869-877, 2010.

V.A. M. Wazwaz, “The extended tanh method for abundant solitary wave solutions of nonlinear wave equations”,Appl. Math. Comput., Vol.:187, Issue: 2,pp.: 1131-1142, 2007.

VI.D. Kumar, A. R. Seadawy, A. K. Joardar,”Modified Kudryashov method via new exact solution for some conformable fractional differential equations arising in mathematical biology”,Chin. J. Phys.,Vol.: 56, Isssue:1,pp.:75-85, 2018.

VII.D. Lu, D. Kang, B. Hong,”New exact solutions of the Drinfel’d SokolovWilson equation”,J. Informa. Comput. Sci., Vol.:18, pp.: 5955-5962, 2013.

VIII.E. Aksoy, M. Kaplan, A. Bekir,”Exponential rational function method for space-time fractional differential equations”,Waves Rand. Compl. Media, Vol.: 26, pp.: 142-151, 2016.

IX.E. Babolian, A. Azizi, J. saeidian,”Some notes on using the homotopy perturbation method for solving time-dependent differential equations”, Math. Comput. Model., Vol.; 50, Issue: 1-2, pp.: 213-224, 2009.

X.E. Fan,”Extended tanh method and its applications to nonlinear equation”. Phys. Lett. A, Vol.: 277, Issue: 4-5,pp.: 212-218, 2000.

XI.E. Fan, J. Zhang,”Applications of the Jacobi elliptic function method to special-type nonlinear equations”,Phys. Lett. A, Vol.:305, Issue: 6, pp.: 383-392, 2002

XII.E. M. E. Zayed,A. G. A. Nowehy,”The solitary wave ansatz method for finding the exact bright and dark soliton solutions of two nonlinear Schrodinger equations”,J. Assn. Arab Univ. Basic Appl. Sci., Vol.: 24, Issue:1, pp.:184-190, 2017.

XIII.F. Mahmud,M. Samsuzzoha, M. A. Akbar, “The generalized Kudryashov method to obtain exact traveling wave solutions of the PHI-four equation and the Fishers equation”,Res. Phys., Vol.: 7, pp.: 4296-4302, 2017.

XIV.G. Allah,R. Musa, Elzaki, M. Tarig, “Application of new homotopy perturbation method for solving partial differential equations”, J. Comput. Theor. Nanosci., Vol.: 15, Issue: 2, pp.: 500-508, 2018.

XV.H. Mao,Q. P. Liu, “Backlund-Darboux transformation and discretizations of 𝑁=2, 𝑎=−2supersymmetric KdV equation”,Phys. Lett. A, Vol.:382, Issue: 5, pp.: 253-258, 2018.

XVI.H. Naher,F. A. Abdullah, M. A. Akbar, “The exp function method for the new exact solution of the nonlinear partial differential equations”, Int. J. Phys. Sci., Vol.: 6, Issue: 29,pp.:6706-6716, 2011.

XVII.H. Triki,A. Yildirim, T. Hayat, O. M. Aldossary, A. Biswas, “Shockwave solution of Benney-Luke equation”,Romanian J. Phys., Vol.: 57, Issue: 7-8, pp.: 1029-1034, 2012.

XVIII.I. Hasim,”Adomian decomposition method for solving BVPs for fourth-order integrodifferential equations”,J. Comput. Appl. Math., Vol.: 193, Issue: 2,pp.:658-664, 2006.

XIX.J. H.He, “Homotopy perturbation technique”,Comput. Methods Appl. Mech. Eng., Vol.:178, Issue: 3-4,pp.:257-262, 1999.

XX.K. A. Gepreel, T. A. Nofal, A. A. Alasmari,”Exact solutions for nonlinear integro-partial differential equations using the generalized Kudryashov method”,J. Egypt. Math. Soc., Vol.: 25, pp.: 438-444, 2017.

XXI.K. Khan, M. A. Akbar, N. H. M. Ali,”The modified simple equation for exact and solitary wave solution of nonlinear evolution equation: the GZK-BBM equation and right-handed non-commutative Burgers equations”,ISRN Math. Phys., pp: 5, Article ID 146704, 2013.

XXII.K. R. Raslan,”The application of He’s exp function method for mKdV and Burgers equations with variable coefficients”,Int. J. Nonlinear Sci., Vol.: 7, Issue: 2, pp.: 174-181, 2009.

XXIII.L. Xu,”He’s parameter expanding methods for strongly nonlinear oscillators”,J. Comput. Appl. Math., Vol.: 207, Issue: 1, pp.: 148-154, 2007.

XXIV.M. A. Akbar, N. H. M. Ali,”The improved F-expansion method with the Riccati equation and its applications in mathematical physics”,Cogent Math. Vol.: 4, ID.: 1282577, 2017

XXV.M. A. Khater, A. R. Seadawy, D. Lu,”Dispersive solitary wave solutions of new coupled Konno-Ono,Higgs field and Maccari equations and their applications”,J. King Saud Univ. Sci., Vol.: 30, pp.: 417-423, 2018.

XXVI.M. Kaplan, A. Bekir, A. Akbulut, E. Aksoy,”The modified simple equation method for nonlinear fractional differential equations”,Romanian J. Phys., Vol.: 60, Issue: 9-10,pp.:1374-1383, 2015.

XXVII.M. K. Elboree,”The Jacobi elliptic function method and its application for two-component BKP hierarchy equations”,Comput. Math. Appl., Vol.: 62, Issue: 12,pp.: 4402-4414, 2011.

XXVIII.M. Koparan, M. Kaplan, A. Bekir, O. Guner,”A novel generalized Kudryashov method for exact solutions of nonlinear evolution equations”,AIP Con. Proc., Vol.: 1798, Issue: 1, 2017.

XXIX.M. M. Kabir, A. Khajeh, E. Aghdam, A. Y. Koma,”Modified Kudryashov method for finding exact solitarywave solutions of higher order nonlinear equations”,Math. Methods Appl. Sci., Vol.: 34, Issue: 2, pp.: 213-219, 2011.

XXX.M. S. Islam, K. Khan, M. A. Akbar,”Application of the improved F-expansion method with Riccati equation to find the exact solution of the nonlinear evolution equations”,J. Egypt. Math. Soc.,Vol.:25, pp.: 13-18, 2017.

XXXI.N. Ahmed, S. Bibi, U. Khan, S. T. Mohyud-din,”A new modification in the exponential rational function method for nonlinear fractional differential equations”,Eur. Phy. J. Plus, Vol.: 133, Issue: 45, 2018.

XXXII.N. Taghizadeh, M. Mirzazadeh,”The first integral method to some complex nonlinear partial differential equations”,J. Comput. Appl. Math., Vol.: 235,pp.:4871-4877, 2011.

XXXIII.O. A. Taiwo,”A parameter expansion method for two-point nonlinear singularly perturbed boundary value problems”,Int. J. Comput. Math., Vol.:55, Issue: 3-4, pp.: 189-196, 1995.

XXXIV.S. H. Dong,”The ansatz method for analyzing Schrodinger’s equation with three anharmonic potentials in D dimensions”,J. Genetic Counse., Vol.: 15, Issue: 4, pp.: 385-395, 2002.

XXXV.S. Kumar, K. Sing, R. K. Gupta,”Coupled Higgs field equations and Hamiltonian amplitude equation: Lie classical approach and (𝐺′/𝐺)-expansion method”,Prama. J. Phys., Vol.: 79, Issue: 1, pp.: 41-60, 2012.

XXXVI.S. Kutluay, A. Esen,”Exp function method for solving the general improved KdV equation”,Int. J. Nonlinear Sci. Numer. Simul., Vol.: 10, Issue: 6, pp.: 717-725, 2009

XXXVII.S. Sirisubtawee, S. koonprasert,”Exact traveling wave solution of certain nonlinearpartial differential equations using the (𝐺′𝐺2)-expansion method”,Advan. Math. Phys., Article ID 7628651, pp.:15, 2018.

XXXVIII.X. J. Yang, H. M. Srivastava, J. H. He, D. Baleanu,”Cantor-type cylindrical co-ordinate method for differential equations with local fractional derivatives”,Phys. Lett. A, Vol.: 377, Issue: 28-30, pp.: 1696-1700, 2013.

XXXIX.Y. C. Hon, E. G. Fan, “A series of the exact solution for coupled Higgs field equations and coupled Schrodinger-Boussinesq equations”, Nonlinear Anal., Theory Methods Appl., Vol.: 71, Issue: 7-8, pp.: 3501-3508, 2009.

XL.Z. Islam,M. M. Hossain, M. A. W. Seikh, “Exact traveling wave solution to Benney-Luke equation”,J. Bangladesh Math. Soc., Vol.: 37, pp.:1-14, 2017.

View Download

Towards Risk Adjusted Performance Appraisal of Indian Mutual Funds

Authors:

Atanu Das

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00008

Abstract:

This paper is based on the study of mutual funds in India which is understood to be one of the most vibrant in the money market. This paper analyses a set of representative schemes from heterogeneous group of different fund houses. There are well established criteria to judge their performance absolutely and also in relative terms. This paper deals with the analysis of risk-returns parameters of different mutual fund schemes and the relation between the risk preference of the investors and the risk adjusted performance (RAP) measure based on real time data. Various tests are applied to evaluate the performance of mutual funds based on well established measures and those tests have been used to rank the funds accordingly. Some hypotheses are constructed and tested to find out whether there are significant differences in their absolute and RAP. The paper also proposed an easy and practical path to solve an optimal portfolio problem containing the various mutual fund schemes. The analysis is carried out with the help of William Sharpe’s single index model and result could of use to substantial investors who are choosing an optimum portfolio of various mutual funds.

Keywords:

Mutual fund,Risk adjusted performance,Sharp index,Optimal portfolio,

Refference:

I.A. Shah, S. Thomas, M. Gorham, India‟s Financial Market: An Insider‟s Guide, How the Markets Work, Academic Publishers, 2008.

II.B. Roy and S. S. Deb, “Conditional Alpha and Performance Persistence for Indian Mutual Funds: Empirical Evidence”, ICFAI Journal of Applied Finance, pp. 30-48, January, 2004.

III.E.Thanou,“Mutual Fund Evaluation During Up and Down Market Conditions: The Case of Greek Equity Mutual Funds”, International Research Journal of Finance and Economics, Vol.:13, pp. 84-93, 2008.

IV.G. Elton, G. Brown, “Modern portfolio theory and investment analysis”, 7th edition, John Wiley & Sons, Inc, 2007.

V.J. A. Haslem, Mutual funds: risk and performance analysis for decision making. John Wiley & Sons, 2009.

VI.J. D. Jobson, and B. Korkie, “Performance Hypothesis Testing with the Sharpe and Treynor Measures”, Journal of Finance, 36, 888-908, 1981.

VII.K. Daniel, M. Grinblatt, S. Titman and R. Wermers, “Measuring mutual fund performance with characteristic-based benchmarks”, Journalof Finance 52, 1035–1058, 1997.

VIII.L. Chan, H. Chen and J. Lakonishok, “On Mutual Fund Investment Styles”, The Review of Financial Studies, Vol.: 15, Issue: 5, pp. 1407-1437, 2002.

IX.M. C.Jensen, “The performance of mutual funds in the period 1945–1964”, The Journal of finance, Vol.: 23, Issue: 2, pp. 389-416, 1968.

X.M. Jayadev, “Mutual Fund Performance: An Analysis of Monthly Returns”, Finance India, Vol.: X, No.: 1, pp. 73–84, 1996

XI.N. D.Rao, “Investment Styles and Performance of Equity Mutual Funds in India”, available at SSRN http://ssrn.com/abstract=922595, 2006.

XII.P. K. Muthappan and E. Damodharan, “Risk-Adjusted Performance of Indian Mutual Funds Schemes”,Finance India,Vol.: 20, Issue: 3, 2006.

XIII.R. Bahadur, P. S. Koirala, “Application of Markowitz and Sharpe Models in Nepalese Stock Market”, The Journal of Nepalese Business Studies, Vol.: III, No.: 1, 2006.

XIV.S. D. Groot, and A. Plantinga, Risk-Adjusted Performance Measures and Implied Risk-Attitudes”, available at http://ssrn.com/abstract=289193, Nov 2001.

XV.S. H. Thomas and A. P. Ralph, “Equity Mutual Fund Historical Performance Ratings as Predictors of Future Performance”, Journal of Financial and Strategic Decisions, Vol.: 9, No.: 1, 1996.

XVI.S. Lee, and S. Stevenson, “Testing the Statistical Significance of Sector and Regional Diversification. Journal of Property Investment, and Finance, Vol.: 23, Issue: 5, pp. 394–411, 2005.

XVII.S. Sankaran, Indian Mutual Funds Handbook , A Guide For Industry Professionals And Intelligent Investors, 2nd ed., Vision Books, 2008.

XVIII.W. F. Sharpe, “The Sharpe Ratio”, Journal of Portfolio Management, Vol.: 21, 1994.

XIX.W. Sharpe, G. J. Alexander, J. W. Bailey, Investment, PHI (2006).

XX.Y. Ali, “Simplifying the Portfolio Optimization Process via Single Index Model”, available http://www.iems.northwestern.edu/docs/undergraduate/honors/Ali.pdf, 2008.

View Download

An Enhanced Data Access Control and Privacy Preserving Mechanism in Cloud Using Uncrackable Cipher Dynamic Double Encryption Standard

Authors:

P. Jhansi Rani, Dr. M. Akkalakshmi

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00009

Abstract:

Cloud computing is the evolving paradigm that provides the services in which cloud consumers can remotely save their data into the cloud and access the on-demand high-quality applications. In the existing technique explained an Extendable Access Control System procedure supposed that the authority is the trusted party, but in many cases, they may perform an illegal action which causes the data loss. The proposed work encrypted the data through Uncrackable Cipher Dynamic Double Encryption Standard (UCDDES). Generally, the UCDDES contains the key length of 32, 40 and 48. To randomly select the key length reduced the data security issues. After dynamically selecting the key length the data governor sent the key request to the authority. Then based on the obtained key length the data governor generated the partial secret key. It is further used to decrypt the data and stored in the cloud storage. The results improve the security of cloud and access control. It reduces the issue of unauthorized user/ hackers accessing data. It increases the cloud security and prevents from dictionary attacks, brute force attacks, collision attacks, and so on.

Keywords:

Cloud computing,data security issues,UCDDES based data encryption,cloud network security,

Refference:

I.Cui, H., Deng, R. H., & Li, Y. (2018). Attribute-based cloud storage with secure provenance over encrypted data.Future Generation Computer Systems,79, 461-472.

II.Di Vimercati, S. D. C., Foresti, S., Jajodia, S., Paraboschi, S., &Samarati, P. (2007, November). A data outsourcing architecturecombining cryptography and access control. InProceedings of the 2007 ACM workshop on Computer security architecture(pp. 63-69). ACM.

III.Divya, S. V., Shaji, R. S., &Venkadesh, P. (2018). An Efficient Data Storage and Forwarding Mechanism Using Fragmentation-Replication and DADR Protocol for Enhancing the Security in Cloud. Journal of Computational and Theoretical Nanoscience,15(1), 111-120.

IV.Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006, October). Attribute-based encryptionfor fine-grained access control of encrypted data. InProceedings of the 13th ACM conference on Computer and communications security(pp. 89-98). Acm.

V.Hur, J. (2013). Improving security and efficiency in attribute-based data sharing.IEEE transactions on knowledge and data engineering,25(10), 2271-2282.

VI.Iyapparaja, M., Navaneethan, C., Meenatchi, S., Kumar, P. J., &Suganya, P. (2017). A Privacy-Preserving Secure Access Control Mechanism in Cloud.

VII.Kumar, K., & Lu, Y. H. (2010). Cloud computing for mobile users: Can offloading computation save energy?.Computer,43(4), 51-56.

VIII.Mell, Peter, and Tim Grance. “The NIST definition of cloud computing.” (2011).

IX.Ning, J., Cao, Z., Dong, X., Liang, K., Wei, L., & Choo, K. K. R. (2018). CryptCloud+: Secure and Expressive Data Access Control for Cloud Storage.IEEE Transactions on Services Computing.

X.Patil, P., Narayankar, P., Narayan, D. G., &Meena, S. M. (2016). A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA, andBlowfish.Procedia Computer Science,78, 617-624.

XI.Qiu, M., Gai, K., Thuraisingham, B., Tao, L., &Zhao, H. (2018). Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financialindustry.Future Generation Computer Systems,80, 421-429.

XII.Sahai, A., & Waters, B. (2005, May). Fuzzy identity-based encryption. InAnnual International Conference on the Theory and Applications of Cryptographic Techniques(pp. 457-473). Springer, Berlin, Heidelberg.

XIII.Shiraz, M., Sookhak, M., Gani, A., & Shah, S. A. A. (2015). A study on the critical analysis of computational offloading frameworks for mobile cloud computing.Journal of Network and Computer Applications,47, 47-60.

XIV.Sookhak, M., Akhunzada, A., Gani, A., Khurram Khan, M., &Anuar, N. B. (2014). Towards dynamic remote data auditing in computational clouds.The Scientific World Journal,2014.

XV.Sookhak, M., Gani, A., Khan, M. K., &Buyya, R. (2017). Dynamic remote data auditing for securing big data storage in cloud computing.Information Sciences,380, 101-116.

XVI.Sookhak, M., Gani, A., Talebian, H., Akhunzada, A., Khan, S. U., Buyya, R., &Zomaya, A. Y. (2015). Remote data auditing in cloud computing environments: a survey, taxonomy, and open issues.ACM Computing Surveys (CSUR),47(4), 65.

XVII.Sookhak, M., Talebian, H., Ahmed, E., Gani, A., & Khan, M. K. (2014). A review on remote data auditing in single cloud server: Taxonomy and open issues.Journal of Network and Computer Applications,43, 121-141.

XVIII.Sookhak, M., Yu, F. R., Khan, M. K., Xiang, Y., &Buyya, R. (2017). Attribute-based data access control in mobile cloud computing: Taxonomy and open issues.Future Generation Computer Systems,72, 273-287.

XIX.Srinivasan, S., & Raja, K. (2018). An Advanced Dynamic Authentic Security Method for Cloud Computing. InCyber Security: Proceedings of CSI 2015(pp. 143-152).Springer Singapore.

XX.Tang, H., Sun, Q. T., Yang, X., & Long, K. (2018). A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense.IEEE Access,6, 26059-26068.

XXI.Wang, C., Ren, K., Lou, W., & Li, J. (2010). Toward publicly auditable secure cloud data storage services.IEEE Network,24(4).

XXII.Whaiduzzaman, M., Sookhak, M., Gani, A., &Buyya, R. (2014). A survey on vehicular cloud computing.Journal of Network and Computer Applications,40, 325-344.

XXIII.Yuan, D., Song, X., Xu, Q., Zhao, M., Wei, X., Wang, H., & Jiang, H. (2018). An ORAM-based privacy-preservingdata sharing scheme for cloud storage.Journal of information security and applications,39, 1-9.

XXIV.Zhou, Z., & Huang, D. (2012, October). Efficient and secure data storage operations for mobile cloud computing. InProceedings of the 8th International Conference on Network and Service Management(pp. 37-45). International Federation for Information Processing.

XXV.Zuo, C., Shao, J., Liu, J. K., Wei, G.,& Ling, Y. (2018). Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage.IEEE Transactions on Information Forensics and Security,13(1), 186-196.

View Download

Demystifying Deep Learning Frameworks- A Comparative Analysis

Authors:

Divyanshu Sinha, JP Pandey, Bhavesh Chauhan

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00010

Abstract:

Deep learning is a rapidly growing field of machine learning which finds the application of its methods to provide solutions to numerous problems related to computer vision, speech recognition, natural language processing, and others. This paper gives a comparative analysis of the five deep learning tools on the grounds of training time and accuracy. Evaluation includes classifying digits from the MNIST data set making use of a fully connected neural network architecture (FCNN). Here we have selected five frameworks— Torch ,Deeplearning4j, TensorFlow, Caffe & Theano (with Keras), to evaluate their performance and accuracy. In order to enhance the comparison of the frameworks, the standard MNIST data set of handwritten digits was chosen for the classification task. When working with the data set, our goal was to identify the digits (0–9) using a fully connected neural network architecture. All computations were executed on a GPU. The key metrics addressed were training speed, classification speed, and accuracy.

Keywords:

Deep Learning, Feedforward MLP,Keras,Tensorflow,Theano,Caffe,Deeplearning4j,Torch,

Refference:

I.Anuj Dutt, AashiDutt. “Handwritten Digit Recognition Using Deep Learning. ” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 6, Issue 7, July 2017.

II.Alexander K. Seewald, “On the Brittleness of Handwritten Digit Recognition Models,”ISRN Machine Vision, vol. 2012, Article ID 834127, 2012.

III.Li DengMicrosoft Research, Redmond, Washington USA. ” The MNIST Database of Handwritten Digit Images for Machine Learning Research [Best of the Web]” IEEE Signal Processing Magazine(Volume: 29,Issue: 6, Nov. 2012).

IV.Muhammad Ramzan, Shahid Mehmood Awan,Hikmat Ullah Khan , Waseem Akhtar, Ammara Zamir,Mahwish Ilyas. “A Survey on using Neural Network based Algorithms for Hand Written Digit.” International Journal of Advanced Computer Science and Applications, Vol. 9, No. 9, 2018.

V.Subhransu Maji and Jitendra Malik EECS Department University of California, Berkeley Technical Report No. UCB/EECS-2009-159 November 25, 2009http://www2.eecs.berkeley.edu/Pubs/TechRpts/2009/EECS-2009-159.pdf

View Download

STATE ESTIMATION AND POWER LOSS MINIMIZATIONOF PESCO GRIDUSING NEWTON RAPHSON AND PARTICLE SWARM OPTIMIZATION

Authors:

Akhtar Khan, Azazullah Khan, Muhammad Aamir Aman, Fazal Wahab Karam

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00011

Abstract:

This study is targeted for reducing the power losses for a branch of Peshawar Electric Supply Company (PESCO), a small electric power grid in Pakistan, starting from Shahibagh and ending at Hayatabad substation. This study evaluates the current configuration of the transmission network, and then by using Particle Swarm Optimization, the best possible configuration that will ensure maximum throughput and minimum transmission and distribution losses is determined. The study is verified using Newton Raphson Method. Newton Raphson method is used to find the state of the mentioned network and then after the new configuration is proposed, the state estimation is done again to evaluate various parameters of the network and confirm its feasibility. The reconfiguration resulted from the PSO and NR methods have shown electric power losses minimization of the selected grid with 15.021%, amounting to a total of 0.3MW power loss minimization.

Keywords:

Power systems, Power system measurements, Power grids,Power system planning,Power transmission,

Refference:

I.Cui-Ru Wang et al., “A modified particle swarm optimization algorithm and its application in optimal power flow problem,” in 2005 International Conference on Machine Learning and Cybernetics, 2005, vol. 5, no. August, p. 2885–2889 Vol. 5.

II.F. R. Zaro and M. A. Abido, “Multi-objective particle swarm optimization for optimal power flow in a deregulated environment of power systems,” 2011 11th International Conference on Intelligent Systems Design and Applications. IEEE, 2011.

III.H. Yoshida, K. Kawata, Y. Fukuyama, S. Takayama, and Y. Nakanishi, “A particle swarm optimization for reactive power and voltage control considering voltage security assessment,” IEEE Trans. Power Syst., vol.15, no. 4, pp. 1232–1239, 2000.

IV.I. M. Malik and D. Srinivasan, “Optimum power flow using flexible genetic algorithm model in practical power systems,” 2010 Conference Proceedings IPEC. IEEE, 2010.

V.J. A. J. A. Momoh, S. X. X. Guo, E. C. C. Ogbuobiri, andR. Adapa, “the Quadratic Interior Point Method Solving Power System Optimization Problems,” IEEE Trans. Power Syst., vol. 9, no. 3, pp. 1327–1336, 1994.

VI.L. L. Lai et al., “Particle Swarm Optimization for Economic Dispatch of Units with Non-Smooth Input-Output Characteristic Functions,” Proceedings of the 13th International Conference on, Intelligent Systems Application to Power Systems. IEEE.

VII.M. A. Abido, “Multiobjective Particle Swarm Optimization for OptimalPower Flow Problem,” in 12th International Middle-East Power System Conference, 2008. MEPCON 2008., 2008, pp. 392–396.

VIII.Muhammad Aamir Aman, 2Muhammad Zulqarnain Abbasi, 3Akhtar Khan, 4Waleed Jan, 5Mehr-e-Munir.Department of Electrical Engineering, IQRA National University, Peshawar, Pakistan. Power Generator Automation, Monitoring and Protection System. J.Mech.Cont.& Math. Sci., Vol. -13, No. -4, September-October (2018) Pages 122 –133.

IX.Muhammad Aamir Aman, 2Muhammad Zulqarnain Abbasi, 3Hamza Umar Afridi, 4KhushalMuhammad, 5Mehr-e-Munir.. Department of Electrical Engineering, IQRA National University, Peshawar, Pakistan. Prevailing Pakistan’s Energy Crises. J.Mech.Cont.& Math. Sci., Vol. -13, No. -4, September-October (2018) Pages 147-154.

X.N.P. Padhy, M. A. Abdel-Moamen, and B. J. Praveen Kumar, “Optimal location and initial parameter settings of multiple TCSCs for reactive power planning using genetic algorithms,” IEEE Power Eng. Soc. Gen. Meet. 2004., vol. 2, pp. 1110–1114, 2004.

XI.Weibing Liu, Min Li, and Xianjia Wang, “An improved particle swarm optimization algorithm for optimal power flow,” 2009 IEEE 6th International Power Electronics and Motion Control Conference. IEEE, pp. 2448–2450, 2009.

View Download

Summarization of 3D-Printing Technology in Processing & Development of Medical Implants

Authors:

Ganzi Suresh, M. Harinatha Reddy, Gurram Narendra Santosh Kumar, S. Balasubramanyam

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00012

Abstract:

3D-printing technology is otherwise called added substance assembling or fast prototyping, is an advanced manufacturing technique which builds 3D parts directly in layer by layer from the computer aided plan model in raster way with minimal wastage of material. Rather than in conventional manufacturing process where material is removed by the hard tool to bring the 3D component in desired model, 3D printing is completely contrast to it where material is added in sequence parts are built in layer by layer, it doesn’t require any post processing as in conventional process. 3D printed parts are more performing under different loading conditions and easy to build and repair parts any stage of design cycle. Due its flexibility of manufacturing, it shows its applications in auto ancillaries, aerospace and medical filed. 3D printing technology showing it influencing in making medical implants. Manufacturing of medical implants in conventional process is very expensive. As these implants vary patient to patient, and it is difficult to make tailor made implants in conventional manufacturing processes. Hence 3D printing technology can overcome this issue with minimal cost for making tailor made implants for individual patients

Keywords:

Additive manufacturing,bio-materials,medical implants,

Refference:

I.C. Nastase-Dan, P. Doru Dumitru, G. Gheorghe Ion, and P. Sanda, “Innovative technology through selective laser sintering in mechatronics, biomedical engineering and industry,” Incas Bull., vol. 3, no. 1, pp. 31–37, 2011.

II.D. T. R. S. G. Pham, “A Comparsion of RP Technologies.pdf.

III.D. V Mahindru, P. Mahendru, V. Mahindru, and P. Mahendru, “Review of Rapid Prototyping-Technology for the Future,” Glob. J. Comput. Sci. Technol. Graph. {&} Vis., vol. 13, no. 4, pp. 27–38, 2013.

IV.F. P. W. Melchels, J. Feijen, and D. W. Grijpma, “A review on stereolithography and its applications in biomedical engineering,” Biomaterials, vol. 31, no. 24, pp. 6121–6130, 2010.

V.G. Suresh and K. L. Narayana, “3D Printing: Breakthroughs in Research and Practice,” in 3D Printing, IGI Global, 2016, pp. 1–21.

VI.G. Suresh and K. L. Narayana, “A Review on Fabricating Procedures in Rapid Prototyping,” Int. J. Manuf. Mater. Mech. Eng., vol. 6, no. 2, 2016.

VII.G. Suresh, K. L. Narayana, and M. K. Mallik, “A Review on Development of Medical Implants by Rapid PrototypingTechnology,” Int. J. Pure Appl. Math., vol. 117, no. 21, pp. 257–276, 2017.

VIII.Ganzi Suresh, K L Narayana and M. Kedar Mallik., “Bio-Compatible Processing of LENSTM Deposited Co-Cr-W alloy for Medical Applications”. International Journal of Engineering and Technology (UAE). 7 (2.20) (2018) 362-366. DOI:10.14419/ijet.v7i2.20.16734.

IX.Ganzi Suresh, K L Narayana, M. Kedar Mallik, V. Srinivas and G. Jagan Reddy., “Processing & Characterization of LENSTM Deposited Co-Cr-W Alloy for Bio-Medical Applications”. International Journal of Pharmaceutical Research (IJPR) Volume 10, Issue-1, 2018, 276-285.

X.Ganzi Suresh, K L Narayana, M. Kedar Mallik, V. Srinivas, G. Jagan Reddy and I.Gurappa.,“Electro Chemical Corrosion Behavior of LENSTM Deposited Co-Cr-W Alloy for Bio-Medical Applications”. International Journal of Mechanical and Production Engineering Research and Development (IJMPERD) Special Issue, Jun 2018, 41-5.

XI.Hangobo Lan, “Web-based rapid prototyping and manufacturing systems: A review,” vol. 60, pp. 643–656, 2009.

XII.I.Palčič, M. Balažic, M. Milfelner, and B. Buchmeister, “Potential of laser engineered net shaping (LENS) technology,” Mater. Manuf. Process., vol. 24, no. 7–8, pp. 750–753, 2009.

XIII.Kumar, G. N. S. and A. Srinath. 2018. “An Ergonomical conditions of Pedestrians on Accelerating Moving Walkway: A People Mover System.” International Journal of Mechanical and Production Engineering Research and Development 8 (Special Issue 7): 1376-1381. www.scopus.com.

XIV.Kumar, Gurram Narendra Santosh, and A. Srinath. “Exploration of Accelerating Moving Walkway for Futuristic Transport System in Congested and Traffical Areas.” (2018): 616-624.

XV.L. Villalpando, H.Eiliat, and R. J. Urbanic, “An optimization approach for components built by fused deposition modeling with parametric internal structures,” Procedia CIRP, vol. 17, pp. 800–805, 2014.

XVII.M. E. W. M. Johnson, M. Rowell, B. Deason, “BENCHMARKING EVALUATION OF AN OPEN SOURCE FUSED DEPOSITION,” pp. 197–211, 1997.

XVIII.M. L. Griffith et al., “Free Form Fabrication of Metallic Components Using Laser Engineered Net Shaping (LENS),” Proc. 7th Solid Free. Fabr. Symp., pp. 125–132, 1996.

XIX.M. Montero, S. Roundy, and D. Odell, “Material characterization of fused deposition modeling (FDM) ABS by designed experiments,” Proc. Rapid Prototyp. Manuf. Conf., pp. 1–21, 2001.

XX.P. B. Klosterman D, Chartoff R, Graves G, Osborne N, “Interfacial characteristics of composites fabricated by laminated object manufacturing,” Compos Part A, vol. 29A, p. 1165–74., 1998.

XXI.P. Chennakesava and Y. S. Narayan, “Fused Deposition Modeling -Insights,” Int. Conf. Adv. Des. Manuf., pp. 1345–1350, 2014.

XXII.P. Rochus, J. Plesseria, M. Van Elsen, J. Kruth, R. Carrus, and T. Dormal, “New applications of rapid prototyping and rapid manufacturing ( RP / RM ) technologies for space instrumentation,” vol. 61, pp. 352–359, 2007.

XXIII.Q. Wei et al., “Selective laser melting of stainless-steel/nano-hydroxyapatite composites for medical applications: Microstructure, element distribution, crack and mechanical properties,” J. Mater. Process. Technol., vol. 222, pp. 444–453, 2015.

XXIV.Rama ChandraManohar, K et al. Modeling and Analysis of Kaplan Turbine Blade Using CFD.International Journal of Engineering & Technology, [S.l.], v. 7, n. 3.12, p. 1086-1089, july 2018. ISSN 2227-524X. Available at: https://www.sciencepubco.com/index.php/ijet/article/view/17766>. Date accessed: 05 jan. 2019. doi:http://dx.doi.org/10.14419/ijet.v7i3.12.17766.

XXV.Sk.Hasane Ahammad,V.Rajesh, “Image Processing based segmentation for spinal cord in MRI”,Indian Journal of Public Health Research and Development 9(6), pp.317-323XVI.M. Domingo-espin, I. Engineering, and U. Ramon, “A methodology to choose the best building direction for Fused Deposition Modeling end-use parts.

View Download

A Cross Layer Protocol to Improve Energy Efficiency and QoSin MANET

Authors:

U. Srilakshmi, Dr.Bandla Srinivasrao

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00013

Abstract:

Limitations of Wireless nodes are the battery power and storage capacity, while plotting a MANET, these are to be considered. By improvising battery life, the energy used by nodes shall be increased such that network is operational. To move data packets efficiently the network, MANET uses smallest Hop Count routing protocol. Most power is used by data transmission process. Key challenges in Ad Hoc networks are the recurring changes in network topology. Network topology changes happen due to motility and finite battery power of the mobile devices. Mostly links are not available in the network as depletion of power source may cause early unavailability of nodes. This paper discusses about the protocol that incorporates link failure prediction at network layer and Power Control Protocol at MAC layer to improve network performance. Performance enhancement in regards to total power transmission, energy regulation and consumption per node along with throughput of our proposed cross layer routing protocol is shown by simulation results when compared to AODV.

Keywords:

MANET,MAC Protocol,Cross layer,AODV,RDSR, LBP-AOMSV,LP-PCP,

Refference:

I.Abdule.S.M etHassan.S, “Divert Failure Route Protocol Based on AODV”, In Network Applications Protocols and Services (NETAPPS), 2010 Second International Conference on. IEEE, 2010.

II.Aman Kumar and Rahul Hans, ”Performance Analysis of DSDV, I-DSDV, OLSR, ZRP Proactive Routing Protocol in Mobile Ad Hoc Networks in IPv6”, International Journal of Advanced Science and Technology Vol.77,pp.25-36, 2015. III.Chakrabarti. S and Mishra. A, “Quality of service challenges for wireless mobile Ad hoc networks”, Wiley J. Wireless Communication and Mobile Computing, vol. 4, n°12, p. 29-153, 2004.

IV.Chang.R and Leu.J, “Long-lived path routing with received signal strength for ad hoc networks”, In Wireless Pervasive Computing, 1stInternational Symposium on. IEEE, 2006.

V.Crawley .E, Nair R., Rajagopalan. B and Sandick. H, “A Framework for QoS-based Routing in the Internet IETF RFC2386”, 2002.

VI.Frank Aune, “Cross-Layer Tutorial”,NTNU 2014.

VII.F. Sophia Pearlin and G. Rekha,“ Performance Comparison of AODV, DSDV and DSR Protocols in Mobile Networks using NS-2”, Indian Journal of Science and Technology, Vol 9(8), February 2016.

VIII.Hwang.YetVarshney.P, “An adaptive QoS routing protocol with dispersity for ad-hoc networks”, chez System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on.IEEE,2003.

IX.John Novatnack , Lloyd Greenwald and Harpreet Arora, “Evaluating ad hoc routing protocols with respect to quality of service”, Wireless And Mobile Computing, Networking And Communications, Volume 3, pp. 205-212,Aug.2005.

X.L. Qin and T. Kunz, “Proactive Route Maintenance in DSR”, SIGMOBILE Mob. Comput. Commun. Rev., Vol. 6, No. 3, pp. 79–89, 2002.

XI.M. Al-Shurman, S.-M.Yoo, and S. Park, “A Performance Simulation for Route Maintenance in Wireless Ad Hoc Networks”, in ACM-SE 42:Proceedings of the 42nd annual Southeast regional conference, New York, USA: ACM, pp. 25–30, 2004.

XII.Mamoun Hussein Mamoun, “Location Aided Hybrid Routing Algorithm for MANET,” Int. Journal of Engineering& Technology IJET/IJENS, Vol. 11, No. 01, pp. 51-57, Feb. 2011.

XIII.Mamoun Hussein Mamoun,”A Proposed Route Selection Technique in DSR Routing Protocol for MANET”, International Journal of Engineering & Technology IJET-IJENS, Vol. 11, No. 02, April 2011.

XIV.MerlindaDrini and Tarek Saadawi, ”Modeling Wireless Channel for Ad-Hoc Network Routing Protocol”, ISCC MarakechMarocco, pp. 549-555, July 2008.

XV.M. F. Sjaugi, M. Othman, and M. F. A. Rasid,“A New Distance Based Route Maintenance Strategy for Dynamic Source Routing Protocol”, Journal of Computer Science, Vol. 4, No. 3, pp. 172–180, 2008.

XVI.M. Tsai, N. Wisitpongphan, and O.K. Tonguz, “Link-Quality Aware AODV Protocol”, in Proc. IEEE International Symposium on Wireless Pervasive Computing (ISWPC) 2006, Phuket, Thailand, January 2006.

XVII.Perkins.C, Belding.E ,Royer and Das.S, “Ad hoc on-demand distance vector routing”, RFC 3561, IETF, 2003.

XVIII.P. Srinivasan and K. Kamalkkannan, “Signal Strength And Energy Aware Reliable Route Discovery in Manet”, International Journal of Communication Network Security, Vol. 1, Issue 4, 2012.

XIX.QoS Forum, July 1999. [On line]. Available: http://www.qosforum.com.

XX.RjabHajlaoui, Sami Touil and Wissemachour,” O-DSR: Optimized DSR Routing Protocol For Mobile Ad Hoc Network”, International Journal of Wireless & Mobile Networks (IJWMN) Vol. 7, No. 4, August 2015.

XXI.RAJESHKUMAR, P.SIVAKUMAR, ”Comparative Study of AODV, DSDV and DSR Routing Protocols in MANET Using NetworkSimulator-2”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 12, December 2013.

XXII.Rajeshwar Singh, Dharmendra K Singh and Lalan Kumar,” Performance Evaluation of DSR and DSDV Routing Protocols for Wireless Ad Hoc Networks”, Int. J. Advanced Networking and Applications 732 Volume: 02, Issue: 04, pp. 732-737 2011.

XXIII.Ravneetkaur, Dr.Neeraj Sharma, “Dynamic node recovery in MANET for high recovery probability”, International Journal of Computer Networks and Applications (IJCNA), Vol 2, Issue 4, July -August 2015.

XXIV.Rohan Gupta, Harbhajan Singh and Gurpreet Singh,” Performance Evaluation of Routing Protocols for Mobile AdhocNetworks ”, Indian Journal of Science and Technology, Vol 10, No. 31, August 2017.

XXV.Rupinder Kaur, Paramdeep Singh et al, ” Performance Enhancement of AODV with Distributed-DSR Routing Protocol in Manet”, Indian Journal of Science and Technology, Vol. 8, No. 28, October 2015.

XXVI.Sarma.N and Nandi.S, “Route stability based QoS routing in mobile AdHoc networks”, Wireless Personal Communications , vol. 54, n° 11,pp. 203-224, 2010.

XXVII.S. Wu, S. Ni, Y. Tseng, and J. Sheu, “Route Maintenance in a Wireless Mobile Ad Hoc Network”, 33rd Hawaii International Conference onSystem Sciences, Maui, 2000.

XXVIII.VivekSoi,and Dr. B.S. Dhaliwal,“ Performance comparison of DSR and AODV Routing Protocol in Mobile Ad hoc Networks”, International Journal of Computational Intelligence Research Volume 13, No. 7, pp. 1605-1616, 2017.

XXIX.Y. Ramesh, Usha Ch. andJagadishGurrala,” CBR based Performance Evaluation on FSR, DSR,STAR-LORA, DYMO Routing Protocols in MANET”, International Journal of Engineering Research and Development, Vol. 2, Issue 9, PP. 17-27, (August 2012).

XXX.ZekiBilgin, Bilal Khan, “A Dynamic Route Optimization Mechanism for AODV in MANETs”, Journal of Computer Science, 2014.

View Download

A REVIEW ON PARAMETERS AFFECTING THE COLLECTION EFFICIENCY OF VENTURI SCRUBBER

Authors:

Dinesh N.Kamble, Ashish M.Umbarkar

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00014

Abstract:

The venturi scrubber has been used as air pollution controlling device. These scrubbers are promising device for cleaning the contaminated gases. It is found in the literature that the performance of venturi scrubber (i.e. collection efficiency), is significantly influenced by droplet distribution, pressure drop, disintegration of liquid, droplet sizes and injection methods. Effect of submergence height, multi-stage injection, position of the orifice, diameter of orifice, throat length and angle of convergence and divergence of venturi scrubber is found scarce and these parameters are affecting collection efficiency drastically. Therefore, it is necessary to study their effect to improve the performance of self-priming venturi scrubber. This article is the review of numerical and experimental study of the performance in venturi scrubber.

Keywords:

Venturi Scrubber,Self-Priming,CFD Modelling,Collection efficiency,

Refference:

I.A.Rahimi,J.Fathikalajahi,andM.Taheri,“ANewMethodofEddyDiffusivityCalculationforDropletsofaVenturiScrubber,”vol.84,no.February,pp.310–315,2006.

II.A.Moharana,P.Goel,andA.K.Nayak,“N12:Performanceestimationofaventuriscrubberanditsapplicationtoself-primingoperationindecontaminatingaerosolparticulates,”Nucl.Eng.Des.,vol.320,pp.165–182,2017.

III.A.M.Silva,J.C.F.Teixeira,andS.F.C.F.Teixeira,“Experimentsinlargescaleventuriscrubber.PartII.Dropletsize,”Chem.Eng.Process.ProcessIntensif.,vol.48,no.1,pp.424–431,2009.

IV.A.SharifiandA.Mohebbi,“AcombinedCFDmodelingwithpopulationbalanceequationtopredictpressuredropinventuriscrubbers,”2013.

V.A.M.Silva,J.C.F.Teixeira,andS.F.C.F.Teixeira,“Experimentsinalarge-scaleventuriscrubber.PartI:Pressuredrop,”Chem.Eng.Process.ProcessIntensif.,vol.48,no.1,pp.59–67,2009.

VI.A.Majid,Y.Changqi,S.Zhongning,W.Jianjun,andG.Haifeng,“CFDsimulationofdustparticleremovalefficiencyofaventuriscrubberinCFX,”Nucl.Eng.Des.,vol.256,pp.169–177,2013.

VII.A.Majid,C.Yan,S.Zhongning,J.Wang,andA.Rasool,“N6:CFDSimulationofThroatPressureinVenturiScrubberMajidAli,”Appl.Mech.Mater.,vol.173,pp.3630–3634,2012.

VIII.A.Rahimi,A.Niksiar,andM.Mobasheri,“Consideringrolesofheatandmasstransferforincreasingtheabilityofpressuredropmodelsinventuriscrubbers,”Chem.Eng.Process.ProcessIntensif.,vol.50,no.1,pp.104–112,2011.

IX.C.Goniva,Z.Tukovic,C.Feilmayr,T.Bürgler,andS.Pirker,“SimulationofoffgasscrubbingbyacombinedEulerian-Lagrangianmodel,”SeventhInt.Conf.CFDMiner.ProcessInd.,no.December,pp.1–7,2009.

X.D.B.RobertsandJ.C.Hill,“Atomizationinaventuriscrubber,”Chem.Eng.Commun.,vol.12,no.1–3,pp.33–68,1981.

XI.D.FernándezAlonso,J.A.S.Gonçalves,B.J.Azzopardi,andJ.R.Coury,“DropsizemeasurementsinVenturiscrubbers,”Chem.Eng.Sci.,vol.56,no.16,pp.4901–4911,2001.

XII.F.AhmadvandandM.R.Talaie,“CFDmodelingofdropletdispersioninaVenturiscrubber,”Chem.Eng.J.,vol.160,no.2,pp.423–431,2010.

XIII.H.E.Hesketh,“FineParticleCollectionEfficiencyRelatedtoPressureDrop,ScrubbantandParticleProperties,andContactMechanism,”J.AirPollut.ControlAssoc.,vol.24,no.10,pp.939–942,1974.

XIV.H.Haller,E.Muschelknautz,andT.Schultz,“VenturiScrubberCalculationandOptimization,”vol.12,pp.188–195,1989.

XV.H.SunandB.J.Azzopardi,“Modellinggas-liquidflowinVenturiscrubbersathighpressure,”ProcessSaf.Environ.Prot.Trans.Inst.Chem.Eng.PartB,vol.81,no.4,pp.250–256,2003.

XVI.J.R.Coury,G.Guerra,R.Be,andJ.A.S.Gonc,“PressureDropandLiquidDistributioninaVenturiScrubber:ExperimentalDataandCFDSimulationVad,”2012.

XVII.J.Fathikalajahi,M.Taheri,andM.R.Talaie,“Theoreticalstudyofnonuniformdropletsconcentrationdistributiononventuriscrubberperformance,”Part.Sci.Technol.,vol.14,no.2,pp.153–164,1996.

XVIII.J.F.andM.R.Talaie,“THEEFFECTOFDROPLETSIZEDISTRIBUTIONONLIQUIDDISPERSIONINAVENTURISCRUBBER,”J.AerosolSci.Vol.,vol.28,no.1,pp.291–292,1997.

XIX.J.A.S.Gonçalves,M.A.M.Costa,M.L.Aguiar,andJ.R.Coury,“AtomizationofliquidsinaPease-AnthonyVenturiscrubber:PartII.Dropletdispersion,”J.Hazard.Mater.,vol.116,no.1–2,pp.147–157,2004.

XX.J.A.S.Gonçalves,D.F.Alonso,M.A.M.Costa,B.J.Azzopardi,andJ.R.Coury,“Evaluationofthemodelsavailableforthepredictionofpressuredropinventuriscrubbers,”J.Hazard.Mater.,vol.81,no.1–2,pp.123–140,2001.

XXI.K.C.GoalandK.G.T.Hollands,“AGeneralMethodforPredictingParticulateCollectionEfficiencyofVenturiScrubbers,”Ind.Eng.Chem.Fundam.,vol.16,no.2,pp.186–193,1977.

XXII.M.TaheriandA.Mohebbi,“N3:Designofartificialneuralnetworksusingageneticalgorithmtopredictcollectionefficiencyinventuriscrubbers,”J.Hazard.Mater.,vol.157,no.1,pp.122–129,2008.

XXIII.M.TaheriandG.F.Haines,“Optimizationoffactorsaffectingscrubberperformance,”J.AirPollut.ControlAssoc.,vol.19,no.6,pp.427–431,1969.

XXIV.M.Lehner,“AerosolSeparationEfficiencyofaVenturiScrubberWorkinginSelf-PrimingMode,”AerosolSci.Technol.,vol.28,no.5,pp.389–402,1998.

XXV.M.A.M.Costa,P.R.Henrique,J.A.S.Gonçalves,andJ.R.Coury,“DropletsizeinarectangularVenturiscrubber,”BrazilianJ.Chem.Eng.,vol.21,no.2,pp.335–343,2004.

XXVI.M.Ali,C.Q.Yan,Z.N.Sun,J.J.Wang,andK.Mehboob,“N5:CFDSimulationofPredictionofPressureDropinVenturiScrubber,”Appl.Mech.Mater.,vol.166–169,pp.3008–3011,2012.

XXVII.M.Costa,A.Riberio,E.Tognetti,M.Aguiar,J.Gonclaves,andJ.Coury,“Performanceofaventuriscrubberintheremovaloffinepowderfromaconfinedgasstream,”Mater.Res.,vol.18,no.2,pp.177–179,2005.

XXVIII.M.M.Toledo-Melchoretal.,“NumericalsimulationofflowbehaviourwithinaVenturiscrubber,”Math.Probl.Eng.,vol.2014,pp.1–8,2014.

XXIX.M.BalandB.C.Meikap,“N10:PredictionofhydrodynamiccharacteristicsofaventuriscrubberbyusingCFDsimulation,”SouthAfricanJ.Chem.Eng.,vol.24,pp.222–231,2017.

XXX.N.V.AnanthanarayananandS.Viswanathan,“EffectofnozzlearrangementonVenturiscrubberperformance,”Ind.Eng.Chem.Res.,vol.38,no.12,pp.4889–4900,1999.

XXXI.N.P.Gulhane,A.D.Landge,D.S.Shukla,andS.S.Kale,“Experimentalstudyofiodineremovalefficiencyinself-primingventuriscrubber,”Ann.Nucl.Energy,vol.78,pp.152–159,2015.

XXXII.N.Horiguchi,H.Yoshida,andY.Abe,“N9:Numericalsimulationoftwo-phaseflowbehaviorinVenturiscrubberbyinterfacetrackingmethod,”Nucl.Eng.Des.,vol.310,pp.580–586,2016.

XXXIII.N.Horiguchi,H.Yoshida,S.Uesawa,A.Kaneko,andY.Abe,“Icone21-16287FilterVenting:PreliminaryAnalysisandObservationofHydraulic,”pp.1–6,2013.

XXXIV.P.Goel,A.Moharana,andA.K.Nayak,“Experimentalstudyofpressuredropinself-primingandsubmergedventuriscrubber,”pp.14–17.

XXXV.P.Goel,A.Moharana,andA.K.Nayak,“Measurementofscrubbingbehaviourofsimulatedradionuclideinasubmergedventuriscrubber,”Nucl.Eng.Des.,vol.327,no.December2017,pp.92–99,2018.

XXXVI.R.H.Boll,“ParticleCollectionandPressureDropinVenturiScrubbers,”Ind.Eng.Chem.Fundam.,vol.12,no.1,pp.40–50,1973.

XXXVII.R.W.K.AllenandA.VanSanten,“DesigningforpressuredropinVenturiscrubbers:Theimportanceofdrypressuredrop,”Chem.Eng.J.Biochem.Eng.J.,vol.61,no.3,pp.203–211,1996.

XXXVIII.S.Nasseh,A.Mohebbi,Z.Jeirani,andA.Sarrafi,“N2:Predictingpressuredropinventuriscrubberswithartificialneuralnetworks,”J.Hazard.Mater.,vol.143,no.1–2,pp.144–149,2007.

XXXIX.S.CalvertandD.Lundgren,“ParticleCollectioninaVenturiScrubber,”J.AirPollut.ControlAssoc.,vol.18,no.10,pp.677–678,1968.

XL.S.Viswanathan,C.C.St.Pierre,andA.W.Gnyp,“Jetpenetrationmeasurementsinaventuriscrubber,”Can.J.Chem.Eng.,vol.61,no.4,pp.504–508,1983.

XLI.S.I.PakandK.S.Chang,“N1:PerformanceestimationofaVenturiscrubberusingacomputationalmodelforcapturingdustparticleswithliquidspray,”J.Hazard.Mater.,vol.138,no.3,pp.560–573,2006.

XLII.S.Calvert,“VenturiandOtherAtomizingScrubbersEfficiencyandPressureDrop,”AIChE,vol.16,no.3,pp.392–396,1970.

XLIII.S.C.Yung,H.F.Barbarika,andS.Calvert,“Pressurelossinventuriscrubbers,”J.AirPollut.ControlAssoc.,vol.27,no.4,pp.348–351,1977.

XLIV.S.Nasseh,A.Mohebbi,A.Sarrafi,andM.Taheri,“N4:Estimationofpressuredropinventuriscrubbersbasedonannulartwo-phaseflowmodel,artificialneuralnetworksandgeneticalgorithm,”Chem.Eng.J.,vol.150,no.1,pp.131–138,2009.

XLV.S.IlKim,J.B.Lee,J.H.Jung,K.S.Ha,H.Y.Kim,andJ.H.Song,“IntroductionoffilteredcontainmentventingsystemexperimentalfacilityinKAERIandresultsofaerosoltest,”Nucl.Eng.Des.,vol.326,no.November2017,pp.344–353,2018.

XLVI.T.J.OvercampandS.R.Bowen,“EffectofThroatLengthandDiffuserAngleonPressureLossAcrossaVenturiScrubber,”J.AirPollut.ControlAssoc.,vol.33,no.6,pp.600–604,1983.

XLVII.V.Sekar,A.W.Gnyp,andC.C.S.Pierre,“ExaminationofGas-LiquidFlowinaVenturiScrubber,”Ind.Eng.Chem.Fundam.,vol.23,no.3,pp.303–308,1984.

XLVIII.V.G.Guerra,M.A.F.Daher,M.V.Rodrigues,J.A.S.Gonçalves,andJ.R.Coury,“DropletInteractionintheLiquidInjectionbyMultipleOrificesinthePerformanceofaVenturiScrubber,”Mater.Sci.Forum,vol.591–593,pp.896–901,2008.

XLIX.V.G.Guerra,J.A.S.Gon??alves,andJ.R.Coury,“ExperimentalinvestigationontheeffectofliquidinjectionbymultipleorificesintheformationofdropletsinaVenturiscrubber,”J.Hazard.Mater.,vol.161,no.1,pp.351–359,2009.

L.V.G.Guerra,J.A.S.Gonçalves,andJ.R.Coury,“ExperimentalverificationoftheeffectofliquiddepositionondropletsizemeasuredinarectangularVenturiscrubber,”Chem.Eng.Process.ProcessIntensif.,vol.50,no.11–12,pp.1137–1142,2011.

LI.X.Gamisans,M.Sarrà,F.J.Lafuente,andB.J.Azzopardi,“Thehydrodynamicsofejector-Venturiscrubbersandtheirmodellingbyanannularflow/boundarylayermodel,”Chem.Eng.Sci.,vol.57,no.14,pp.2707–2718,2002.

LII.Y.Zhou,Z.Sun,H.Gu,andZ.Miao,“Structuredesignonimprovinginjectionperformanceforventuriscrubberworkinginself-primingmode,”Prog.Nucl.Energy,vol.80,pp.7–16,2015.

LIII.Yung,“venturiscrubberperformancemodel.PDF,”vol.7,no.9,pp.10–13,1978.

LIV.Y.Zhou,Z.Sun,H.Gu,andZ.Miao,“Experimentalresearchonaerosolscollectionperformanceofself-primingventuriscrubberinFCVS,”Prog.Nucl.Energy,vol.85,pp.771–777,2015.

LV.Y.Zhou,Z.Sun,H.Gu,andZ.Miao,“Performanceofiodidevapourabsorptionintheventuriscrubberworkinginself-primingmode,”Ann.Nucl.Energy,vol.87,pp.426–434,2016.

View Download

Robust Algorithm for Telugu Word Image Retrieval and Recognition

Authors:

Kesana Mohana Lakshmi, Tummala Ranga Babu

DOI NO:

https://doi.org/10.26782/jmcms.2019.02.00015

Abstract:

The most challenging task is searching Telugu script from the database because of difficulty in differentiating the Characteristics of the Telugu word or scripts. In this, we introduced robust approach for Telugu script retrieval using transformation-based methodology. Non-subsampled contourlet transform (NSCT) is utilized for texture classification which will function based on Non-subsampled pyramid filter bank (NSPFB) and Non-subsampled directional filter bank (NSDFB). Spatial dependence matrix is utilized to extract the texture features. In addition, image statistics is computed to enhance the retrieval performance further. Finally, hamming similarity metric is calculated which calculates the distance between trained and test word templates, which an effective distance metric over conventional Euclidean distance. In order to test, missing segment, noisy, corrupted and occlusion effected words are used as an input and taken into consideration multi conjunct vowel consonant clustered word images for showing the robustness of presented algorithm. In the substantial simulation analysis gives the presented technique finds most similar word images from database although if it is under testing conditions. Our presented scheme has superior performance compared to the traditional approaches described in the literature with respect to mean Average Precision (mAP) and mean Average Recall (mAR).

Keywords:

Telugu script,texture features,statistical properties,non-subsampled contourlet transform,statistical parameters,feature vector and hammingdistance metric,

Refference:

I.Arthur L. da Cunha, Jianping Zhou,and Minh N. Do, “The Non-subsampled Contourlet Transform: Theory, Design and Applications”, IEEE Transaction on Image Processing, Vol. 15, No. 10, pp. 3089-3100, 2006.

II.B. Verma, M. Blumenstein, S. Kulkarni, “Recent achievements in off-line handwriting recognition systems”, School of Information Technology, Griffith University, Gold Coast Campus.

III.C. V. Jawahar and A. Kumar, “Content-level Annotation of Large Collection of Printed Document Images”, In: Proc. of International Conf. on Document Analysis and Recognition, Parana, Brazil, 2007.

IV.C. V. Jawahar, M. N. S. S. K. Pavan Kumar, S. S. Ravi Kiran, “A Bilingual OCR for Hindi-Telugu Documents and its Applications”, Centre for Visual Information Technology, International Institute of Information Technology, Hyderabad.

V.D. G. Lowe, “Distinctive Image Features from Scale-Invariant Key points,” International Journal of Computer Vision, Vol. 60, No. 2, pp. 91-110, 2004.

VI.Danish Nadeem and Saleha Rizvi, “Character recognition using template matching”, Department of Computer Science, JamiaMilliaIslamia, New Delhi, 2015.

VII.E Candes and D. Donoho, “Curvelets –a surprisingly effective nonadaptive representation for objects with edges.” In: A. Cohen, C. Rabut and L. Schumaker, Editors,Curves and Surface Fitting: Saint-Malo 1999, Vanderbilt University Press, Nashville, pp. 105–120, 2000.

VIII.E. Kreyszig, Advanced Engineering Mathematics, J. Willey & Sons Inc. 2011.

IX.E. Kreyszig, Advanced Engineering Mathematics, J. Willey & Sons Inc. 2011.

X.I. Z. Yalniz and R. Manmatha, “An Efficient Framework for Searching Text in Noisy Document Images”, IAPS International Workshop on Document Analysis Systems, Gold Cost, QLD, Australia, pp. 48-52, 2012.

XI.J. van Gemert, C. J. Veenman, A. W. M. Smeulders, and J.-M. Geusebroek, “Visual Word Ambiguity”, IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol. 32, No. 7, pp.1271-1283, 2010.

XII.J. van Gemert, J.-M. Geusebroek, C. J. Veenman, and A. W. M. Smeulders, “Kernel Codebooks for Scene Categorization”, In: Proc. Of European Conf. on Computer Vision, Berlin, Heidelberg, pp. 696-709, 2008.

XIII.Jangala. Sasi Kiran, N. Vijaya Kumar, N. SashiPrabha and M. Kavya, “A Literature Survey on Digital Image Processing technique in character recognition of Indian languages”, International Journal of Computer Science and Information Technologies, Vol. 6, No. 3, pp. 2065-2069, 2015.

XIV.Jatin M Patil and Ashok P. Mane, “Multi Font and Size Optical Character Recognition Using Template Matching”, International Journal of Emerging Technology and Advanced Engineering, Vol. 3, No. 1, pp. 504-506, 2013.

XV.K Mohana Lakshmi and T RangaBabu, “Searching for Telugu Script in Noisy Images using SURF Descriptors”, IEEE 6th International Conference on Advance Computing, pp: 480-483, 2016.

XVI.K. Takeda, K. Kise, and M. Iwamura, “Real-time document image retrieval for a 10 Million pages database with a memory efficient and stability improved LLAH”, International Conf. on Document Analysis and Recognition, Beijing, China, pp. 1054-1058, 2011.

XVII.K.Mohana Lakshmi, Dr.T.Ranga Babu, “A Novel Telugu Script Recognition and Retrieval Approach Based on Hash Coded Hamming , ICCCPE(Springer LNS), 978-981-13-0211-4, 2018.

XVIII.KesanaMohana Lakshmi and TummalaRangaBabu, “A New Hybrid Algorithm for Telugu Word Retrieval and Recognition”, International Journal of Intelligent Engineering and Systems, Vol. 11, No. 4, pp.117-127, 2018.

XIX.M N Do and M Vetterli, “The contourlet transform: an efficient directional multiresolution image representation”, IEEE Transactions on Image Processing, Vol. 14, No. 12, pp. 2091-2106, 2005.

XX.M. J. Shensa, “The discrete wavelet transform: Wedding the àtrous and Mallat algorithms,” IEEE Trans. Signal Process., Vol. 40, No. 10, pp. 2464–2482, 1992.

XXI.M. Wenying and D. Zuchun, “A Digital Character Recognition Algorithm Based on the Template Weighted Match Degree”, International Journal of Smart Home, Vol.7, No. 3, pp. 53-60, 2013.

XXII.Md. Mahbubar Rahman, M. A. H. Akhand, Shahidul Islam, Pintu Chandra Shill and M. M. Hafizur Rahman, “Bangla Handwritten Character Recognition using Convolutional Neural Network”, International Journal of Image, Graphics and Signal Processing, Vol. 7, No. 8, pp. 42-49, 2015.

XXIII.N. Sharma, S. Chanda, U. Pal and M. Blumenstein, “Word-wise Script Identification from Video Frames”, In: Proc. of International Conf.on Document Analysis and Recognition, Washington, DC, USA, pp.867-871, 2013.

XXIV.N. Shobha Rani Vasudev T and Pradeep C.H. “A Performance Efficient Technique for Recognition of Telugu Script Using Template Matching”, International Journal of Image, Graphics and Signal Processing, Vol. 8, No. 3, pp.15-23, 2016. XXV.N. Shobha Rani, T. Vasudev, “A Generic Line Elimination Methodology using Circular Masks for Printed and Handwritten Document Images”, Emerging research in computing, information, communication and applications ELSEVIER science and technology, Vol. 3, No. 1, pp. 589-594, 2014.

XXVI.N.sharma, U.Pal, and M. Blumenstein, “A Study on Word Level Multi-script Identification from Video Frames”, In: Proc. of International Joint Conf. on Neural Networks, Beijing, China, pp.1827-1833, 2014.

XXVII.Nagasudha D and Y MadhaviLatha, “Keyword Spotting using HMM in Printed Telugu Documents”, In: Proc. of International Conf. on Signal Processing, Communication, Power and Embedded Systems, Paralakhemundi, India, pp: 1997-2000, 2016.

XXVIII.Nikhil Rajiv Pai and Vijaykumar S. Kolkure, “Design and implementation of optical character recognition using template matching for multi fonts size”, International Journal of Research in Engineering and Technology, Vol. 4, No. 2, pp. 398-400, 2015.

XXIX.P. Shivakumara, N. Sharma, U. Pal, M. Blumenstein, and C. L. Tan, “Gradient-Angular-Features for Word-wise Video Script Identification”, In: Proc. of International Conf. on Pattern Recognition, Stockholm, Sweden, pp.3098-3103, 2014.

XXX.R. Shekhar and C. V. Jawahar, “Word Image Retrieval Using Bag of Visual Words”, IAPS International Workshop on Document Analysis Systems, Gold Cost, QLD, Australia, pp. 297-301, 2012.

XXXI.Ravi Shekhar and C V Jawahar, “Word Image Retrieval Using Bag-of-Visual Words”, In: Proc. of IAPR International Workshop on Document Analysis Systems, Gold Cost, QLD,

XXXII.Rinki Singh, Manideep Kaur, “OCR for Telugu Script Using Back-Propagation Based Classifier”, International Journal of Information Technology and Knowledge Management, Vol. 2, No. 2, pp. 639-643, 2010.

XXXIII.S. Lazebnik, C. Schmid, and J. Ponce, “Beyond bags of features: Spatial pyramid matching for recognizing natural scene categories”, In: Proc. of IEEE Computer Society Conf. onComputer Vision and Pattern Recognition, New York, USA, 2006.

XXXIV.Soumendu Das and Sreeparna Banerjee, “An Algorithm for Japanese Character Recognition”, International Journal of Image, Graphics and Signal Processing, Vol. 7, No. 1, pp. 9-15, 2014.

XXXV.Suman V Patgar, Vasudev T, Murali S, “A system for detection of fabrication in photocopy document”, Journal of Computer Science & Information Technology, Vol. 5, No. 14, pp. 29–35, 2015.

XXXVI.T. M. Rath and R. Manmatha, “Word spotting for historical documents”, International Journal of Document Analysis and Research, Vol. 9, No. 2-4,pp.139-152, 2007.

View Download